PKI Security in Large-Scale Healthcare Networks

During the past few years a lot of PKI (Public Key Infrastructures) infrastructures have been proposed for healthcare networks in order to ensure secure communication services and exchange of data among healthcare professionals. However, there is a plethora of challenges in these healthcare PKI infrastructures. Especially, there are a lot of challenges for PKI infrastructures deployed over large-scale healthcare networks. In this paper, we propose a PKI infrastructure to ensure security in a large-scale Internet-based healthcare network connecting a wide spectrum of healthcare units geographically distributed within a wide region. Furthermore, the proposed PKI infrastructure facilitates the trust issues that arise in a large-scale healthcare network including multi-domain PKI infrastructures.

[1]  Stephen Wilson Public key superstructure "it's PKI Jim, but not as we know it!" , 2008, IDtrust '08.

[2]  Helena Rifà-Pous,et al.  An Interdomain PKI Model Based on Trust Lists , 2007, EuroPKI.

[3]  Chen Wu,et al.  New Framework for Authentication and Authorization for e-Health Service Systems , 2006, 2006 IEEE International Conference on Industrial Technology.

[4]  André Zúquete,et al.  Authentication Architecture for eHealth Professionals , 2007, OTM Conferences.

[5]  Geoff Skinner,et al.  A framework of authentication and authorization for e-health services , 2006, SWS '06.

[6]  G Kambourakis,et al.  PKI-based secure mobile access to electronic health services and data. , 2005, Technology and health care : official journal of the European Society for Engineering and Medicine.

[7]  William T. Polk,et al.  Public Key Infrastructures that Satisfy Security Goals , 2003, IEEE Internet Comput..

[8]  Christos Douligeris,et al.  Network Security: Current Status and Future Directions , 2007 .

[9]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[10]  David Chadwick,et al.  Access control: how can it improve patients' healthcare? , 2007, Studies in health technology and informatics.

[11]  Jiankun Hu,et al.  Corresponding author’s address: , 2022 .

[12]  David W. Chadwick,et al.  Experiences of using a PKI to access a hospital information system by high street opticians , 2003, Comput. Commun..

[13]  Kent E. Seamons,et al.  Proceedings of the 8th Symposium on Identity and Trust on the Internet , 2008 .

[14]  Rolf Oppliger,et al.  Authentication and authorization infrastructures (AAIs): a comparative survey , 2004, Comput. Secur..

[15]  R. Engelbrecht,et al.  Connecting medical informatics and bio-informatics : proceedings of MIE2005 : the XIXth International Congress of the European Federation for Medical Informatics , 2005 .

[16]  Zahir Tari,et al.  On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS, OTM Confederated International Conferences CoopIS, DOA, ODBASE, GADA, and IS 2007, Vilamoura, Portugal, November 25-30, 2007, Proceedings, Part I , 2007, OTM Conferences.

[17]  Henning Voss,et al.  The Baltic Health Network - Taking Secure, Internet-based Healthcare Networks to the Next Level , 2005, MIE.

[18]  André Zúquete,et al.  Authentication of Professionals in the RTS E-Health System , 2008, HEALTHINF.

[19]  F. Al-Nayadi,et al.  An Authentication Framework for e-Health Systems , 2007, 2007 IEEE International Symposium on Signal Processing and Information Technology.

[20]  Stephen Wilson Public Key Superstructure , 2008 .